Splunk Enterprise Vulnerability: Arbitrary JavaScript Code Execution in Browser Context
CVE-2024-36997
4.6MEDIUM
Key Information:
- Vendor
- Splunk
- Vendor
- CVE Published:
- 1 July 2024
Summary
In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312, an admin user could store and execute arbitrary JavaScript code in the browser context of another Splunk user through the conf-web/settings REST endpoint. This could potentially cause a persistent cross-site scripting (XSS) exploit.
Affected Version(s)
Splunk Cloud Platform 9.1.2312 < 9.1.2312.100
Splunk Enterprise 9.2 < 9.2.2
Splunk Enterprise 9.1 < 9.1.5
References
CVSS V3.1
Score:
4.6
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
STÖK / Fredrik Alexandersson